Abstract
Recently, two generic watermarking protocols were proposed, based on a popular zero-knowledge identification protocol. In this paper, we show that both protocols are flawed and therefore fail to achieve their purpose of allowing a prover to prove to a verifier of his ownership of a watermarked image. We also give some suggestions to fix these flaws.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Adelsbach, A., Sadeghi, A.-R.: Zero Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)
Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)
Feige, U., Fiat, A., Shamir, A.: Zero Knowledge Proofs of Identity. In: 19th Annual ACM Symposium on the Theory of Computing, pp. 210–217 (1987)
Feige, U., Fiat, A., Shamir, A.: Zero Knowledge Proofs of Identity. Journal of Cryptology 1(2), 77–94 (1988)
Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proc. IEEE 87, 1079–1107 (1999)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Pfitzman, B., Sadeghi, A.R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150–163. Springer, Heidelberg (1999)
Pfitzman, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)
Pfitzman, B., Waidner, W.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)
Quisquater, J.-J., Guillou, L.C., Berson, T.A.: How to Explain Zero-Knowledge Protocols to Your Children. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 628–631. Springer, Heidelberg (1990)
Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Chichester (1996)
Swanson, M., Kobayashi, M., Tewfik, A.: Multimedia Data Embedding and Watermarking Technologies. Proc. IEEE 86, 1064–1087 (1998)
Then, P.H.H., Wang, Y.C.: Towards Generic Zero Knowledge Protocol for Blind Watermark Detection. In: International Conference on IT in Asia (CITA 2003), pp. 278–282 (2003)
Then, H.H.P., Wang, Y.C.: Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 570–580. Springer, Heidelberg (2004)
Voyatzis, G., Pitas, I.: The Use of Watermarks in the Protection of Digital Multimedia Products. Proc. IEEE 87, 1197–1207 (1999)
Wagner, N.R.: Fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 18–22 (1983)
Wolfang, R., Podilchuk, C., Delp, E.: Perceptual Watermarks for Digital Images and Video. Proc. IEEE 87, 1108–1126 (1999)
Zhao, J., Koch, E.: Embedding Robust Labels Into Images For Copyright Protection. In: International Congress on Intellectual Property Rights for Specialized Information. Knowledge and New Technologies, Vienna (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Phan, R.C.W., Ling, HC. (2005). Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-31805-7_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24839-2
Online ISBN: 978-3-540-31805-7
eBook Packages: Computer ScienceComputer Science (R0)